General
-
Target
file.exe
-
Size
1021KB
-
Sample
230327-rqp44sfh7s
-
MD5
f616eefd5bfdb6319b6314777d18cfcc
-
SHA1
c6f6ac1c9418b787cf3e06c1b8ccd737397f9704
-
SHA256
cf88c19e1ed803ce213ffd1685f3cbdd787937c918a5dda0f0a2b33d62d18ee3
-
SHA512
a908c0f41436b85419134c6ef0185e8f74d5382ec48d61fc99867850fb2a34b7e1569762e03d9a5c7a9613f899269f09de9e765bcf39a8a3315648bd83989b9f
-
SSDEEP
24576:fy2IEjzDoJ3CM0yMaBku1LXA/NNMQV2QbRI6nQvZ4V:q/ODoRCzayu1kDMyNQx
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
file.exe
-
Size
1021KB
-
MD5
f616eefd5bfdb6319b6314777d18cfcc
-
SHA1
c6f6ac1c9418b787cf3e06c1b8ccd737397f9704
-
SHA256
cf88c19e1ed803ce213ffd1685f3cbdd787937c918a5dda0f0a2b33d62d18ee3
-
SHA512
a908c0f41436b85419134c6ef0185e8f74d5382ec48d61fc99867850fb2a34b7e1569762e03d9a5c7a9613f899269f09de9e765bcf39a8a3315648bd83989b9f
-
SSDEEP
24576:fy2IEjzDoJ3CM0yMaBku1LXA/NNMQV2QbRI6nQvZ4V:q/ODoRCzayu1kDMyNQx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-